Dating a cyber snooper

There has not yet been a single widespread Linux virus or malware infection of the type that is common on Microsoft Windows; this is attributable generally to the malware's lack of root access and fast updates to most Linux vulnerabilities.

Like Unix systems, Linux implements a multi-user environment where users are granted specific privileges and there is some form of access control implemented.

Trusting a specific site is not based on facts, but rather on statements from the website itself.

A virus/trojan/worm author who successfully targeted specifically Apache httpd Linux/x86 Web servers would both have an extremely target-rich environment and instantly earn lasting fame, and yet it doesn't happen.The definition of computer under the Act is wide, and includes mobile devices such as cellphones, which can be used to commit crimes electronically.The provision under Section 3 of the Act, though not yet interpreted by the courts, could include hacking as well as physically going onto a computer and removing documents to which a person is not authorised.Whether or not he was telling the truth, it seems he was totally unaware that such actions were breaches of the Cybercrimes Act, 2015.Section 3 of the Act makes it a crime for somebody to knowingly obtain data from any programme or computer without authorised access.To gain control over a Linux system or to cause any serious consequences to the system itself, the malware would have to gain root access to the system.

168

Leave a Reply